SlideShare une entreprise Scribd logo
1  sur  52
• RISK DEFINITION: A Risk is a potential or future event that, should it occur,
will have a (negative) impact on the Business Objectives of an Organisation
o A risk must have Uncertainty, (in terms of Probability or Likelihood). It
might happen
o A risk must have a measurable Impact, (usually measured in monetary
terms, but other criteria are acceptable, reputation for example)
o “It May Rain Tomorrow”
• ISSUE DEFINITION: An Issue is a current event that will have a (negative)
impact on the Business Objectives of an Organisation
o E.g. An Incident, a manifested risk, an Audit Non-Compliance finding, an
Equipment or Supplier failure
o “It is Raining Today”
RISK DEFINITIONS
3
Risk Life Cycle
Threat Agent
Vulnerability
Risk
Asset
Exposures
Safeguard
Exploits
Leads to
Can damage
And cause an
Can be
countermeasured by a
4
Risk Management Cycle
Identify Risks
Assess Risks
Define Desired
Results
Select Strategy
Implement
Strategy
Monitor
Evaluate and
Adjust
The Process
is iteration
•The Processes are organized
• Each Step output considered
as an input for the next step
Risk
Control
Risk
Assessment
5
6
Risk Identification
What is the purpose of this phase ?
• The aims of this phase is to identify , classify
and prioritizing the organization’s information
assets ( Know ourselves) and identify all
important types and sources of risk and
uncertainty (know our enemy), associated with
each of the investment objectives.
• This is a crucial phase. If a risk is not identified
it cannot be evaluated and managed
7
Information Assets
IS
Components
People Procedures Data
Transmission
HW
SW
Employees
Non-
employees
People at
trusted
organizations
Authorized
Staff
Other staff Strangers
Standard
Procedures
Sensitive
Procedures
Process
Storage
Application
OS
Security
Component
System
Devises
Net Work
8
Primary sources
of Risk Items
Human Threats
Environmental
Threats
Outside &
Natural Threats
network
based attacks
virus infection,
unauthorized access
floods
Earthquakes
hurricanes
Power failure,
pollution
Risk Analysis
• requires an entity to, conduct an accurate and
thorough assessment of the potential risks and
vulnerabilities to the confidentiality, integrity, and
availability of electronic protected information
held by the entity.
• Risk analysis, which is a tool for risk management,
is a method of identifying vulnerabilities and
threats, and assessing the possible damage to
determine where to implement security
safeguards
10
Risk Assessment
• For each identified component & risk, which has a 'clearly significant'
or 'possibly significant' position, each should be assess to establish
qualitatively and Estimate the value
27/05/1444 11
What is Risk Assessment ?
• Assessing risk is the process of determining the
likelihood of the threat being exercised against the
vulnerability and the resulting impact from a successful
compromise , i.e determine the relative risk for each of the
vulnerabilities
• Risk assessment assigns a risk rating or score to each
specific information asset, useful in evaluating the relative
risk and making comparative ratings later in the risk control
process.
• Although all elements of the risk management cycle are
important, risk assessments provide the foundation for other
elements of the cycle. In particular, risk assessments provide
a basis for establishing appropriate policies and selecting
cost-effective techniques to implement these policies
12
Methods of Risk Assessment
There are various methods assessing risk,
First : Quantitative risk assessment :
generally estimates values of Information Systems components as ;
information, systems, business processes, recovery costs, etc., risk
can be measured in terms of direct and indirect costs , based on
(1) the likelihood that a damaging event will occur
(2) the costs of potential losses
(3) the costs of mitigating actions that could be taken.
13
This approach can be taken by defining
– Risk in more subjective and general terms such as high,
medium, and low.
– In this regard, qualitative assessments depend more on the
expertise, experience, and judgment of those conducting the
assessment.
• Qualitative risk assessments typically give risk results of “High”,
“Moderate” and “Low”. However, by providing the impact and
likelihood definition tables and the description of the impact, it is
possible to adequately communicate the assessment to the
organization’s management.
Second : Qualitative Risk Assessment
14
Third :Quantitative and Qualitative
– It is also possible to use a combination of quantitative and
qualitative method
• The identification of Risks and their management by defining:
 The Risk Description
 The Risk Owner
 The Probability of the Risk Event occurring
 The Risk Impact in terms of cost, loss of assets, Reputation … Failure to meet a
Business Objective
 The most suitable Mitigations that will prevent or reduce the Likelihood of the Risk
Event occurring with relation to their costs and the reduction of Risk Exposure
 The Contingency Plan to recover the Asset once risk is manifested
 An understanding of Corporate Risk Appetite and where appropriate the application
of Risk Tolerance
WHAT IS RISK MANAGEMENT?
To ensure that all risks to the Business
however they are derived are
managed effectively.
• This includes:
• Strategic Risks
• Programme and Project Risks
• Operational Risks (includes Security
and Business Continuity Risks)
OBJECTIVES OF GENERIC RISK MANAGEMENT
Operational Level
(Business as Usual)
Change
Level
Operational
Risk Register
Information
Security Risk
Register
BAU
Business
continuity
Strategic
Level
Strategic
Risks
Programme/Project Risks
Operational Risks
Project Risk
Register
Strategic Risk Register
To ensure that the risks to the Organisation that are derived from,
Incidents, Threats, Vulnerabilities and Audit non-compliances are
managed effectively.
In Security Terms these are those risks that impact the:
• Confidentiality,
• Integrity,
• Availability, and the
• Traceability of Information whilst:
• At rest
• Whilst being modified
• In transit (around a system, e-mail, media device, telephone etc.)
OBJECTIVES OF INFORMATION SECURITY
RISK MANAGEMENT
Incident Management
Audit Non-Compliances
Problem Management
Threat Management
Vulnerability Management
Exception / Waiver Management
! However, they can be the Source of Infosec
So, these are issues, NO uncertainty!
WHAT IS NOT RISK MANAGEMENT?
RISK MATRIX
IMPACT
High Medium High High
Medium Low Medium High
Low Low Low Medium
Low Medium High
LIKELIHOOD
COMMON PROBLEMS
(MISUNDERSTANDINGS)?
• Poor Risk Descriptions (Risk vs Issue and
Impact confusion) (Qualification vs
Quantification)
• Unachievable, ineffective and
disproportionate Mitigation Actions
• Poor Control, risk owner vs risk
mitigation owner. Stakeholder
Involvement
• Reactive vs Proactive Approach
• Reliance on Incidents, Threat and
Non-Compliance Management
(Reactive)
• Proactive Risk Identification
Workshop based on Success Criteria
SO WHAT!
• Risks occur that could have been
managed
• Impact on Assets not understood (BIA,
CMDB)
• Mitigation Action Costs do not reflect the
Risk Exposure Reduction
• Systems fail, business and revenue lost,
• Corporate data is unavailable when
required – Loss of Business
• Regulator penalties, reputational damage
occurs
• Loss of Customer base and confidence
• Loss of IPR.
PROBLEMS WITH RISK MANAGEMENT
o Mitigations or Controls are primarily used to prevent the occurrence of a risk
or to reduce the Probability of Risk occurrence - (Reduce Probability).
o This is why it is so important to describe the risk event clearly.
o Contingency Plans address the Impact of the Risk plans and are used to
recover a system from the effect of a risk should it occur, a mini BCP -
(Reduce Impact)
o This is why it is so important to clearly describe the risk impact separately from
the risk description
MITIGATION PLANS & CONTINGENCY PLANS
o Proliferation of BYOD and smart devices
o Cloud computing
o Outsourcing of critical business processes to a third party (and lack of
controls around third-party services)
o Disaster recovery and business continuity
o Periodic access reviews
o Log reviews
SOURCE: Cyber-security - What the Board of Directors need to ask?,
IIARF Research Report, 2014
SOURCES OF CYBER SECURITY RISKS
o Application vulnerabilities
o Remote access.
o Ineffective patch management
o Weak network security/flat networks
o Lack of real-time security monitoring
o Third parties
o Lack of a data retention policy
SOURCE: HANS HENRIK BERTHING
Cyber Assurance and the IT Auditor Nov 2014
COMMON CYBER-CRIMINAL ATTACK VECTORS
Select appropriate Controls / use Security Standards:
ISO27000
PCI DSS
COBIT
HIPAA
WHERE TO START?
1. Create risk reporting awareness for the workforce
2. Make it easy, create a simple Risk Submission form
3. Assess the risk submission, ask questions
4. Ensure it is a RISK, not an issue, a service request, a change request 
ENCOURAGE RISK REPORTING
1. Record in a Risk Register
2. Describe the RISK
3. Assess the Likelihood, Impact, and risk rating
4. Agree recommended Risk Mitigation / Treatment
5. Establish a contingency position if possible
6. Assign to an appropriate RISK OWNER (usually a Business Stakeholder)
7. Agree a Mitigation Owner
8. Obtain a decision (Reduce, Accept, Avoid, Transfer)
9. Monitor mitigation progress until target risk is achieved – retain awareness
of closed or mitigated risks
10. Produce monthly status reports
MANAGE THE RISKS…

Contenu connexe

Tendances

Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management processDr Riyaz Muhmmad
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Risk Management
Risk ManagementRisk Management
Risk Managementcgeorgeo
 
Risk-management
 Risk-management Risk-management
Risk-managementUmesh Gupta
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in businessr2financial
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk pptNehaKamboj10
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideSlideTeam
 
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNTRisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNTSonu Sah
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementPYA, P.C.
 

Tendances (20)

Chapter2 risk management process
Chapter2  risk management processChapter2  risk management process
Chapter2 risk management process
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Risk management
Risk managementRisk management
Risk management
 
Risk management
Risk managementRisk management
Risk management
 
The importance of risk management in business
The importance of risk management in businessThe importance of risk management in business
The importance of risk management in business
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Organizational Risk Management
Organizational Risk Management Organizational Risk Management
Organizational Risk Management
 
Operational risk ppt
Operational risk pptOperational risk ppt
Operational risk ppt
 
Risk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation SlideRisk Identification PowerPoint Presentation Slide
Risk Identification PowerPoint Presentation Slide
 
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNTRisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
RisK, RiSk MaNaGeMeNt & EnterPRise RisK ManaGemeNT
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Risk Appetite
Risk AppetiteRisk Appetite
Risk Appetite
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 

Similaire à Risk Management (1) (1).ppt

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfAbdulrafiiMohammed
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)rafeeqameen
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk managementDr. Lasantha Ranwala
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...samahhamed3
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazMDAnwarIbrahimMiraz
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementRand W. Hirt
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsToño Herrera
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis"Apolonio \"Apps\"" Garcia
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementStephen Ong
 
Qrm presentation
Qrm presentationQrm presentation
Qrm presentationGeetha Svcp
 

Similaire à Risk Management (1) (1).ppt (20)

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
RiskAssesment.ppt
RiskAssesment.pptRiskAssesment.ppt
RiskAssesment.ppt
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
 
Chapter 1 risk management (3)
Chapter 1  risk management (3)Chapter 1  risk management (3)
Chapter 1 risk management (3)
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Dealing with Operational and Ecosystem Risk
Dealing with Operational and Ecosystem RiskDealing with Operational and Ecosystem Risk
Dealing with Operational and Ecosystem Risk
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
51_operational_risk
51_operational_risk51_operational_risk
51_operational_risk
 
Introduction to quality management system • Product quality review (PQR) • Qu...
Introduction to quality management system• Product quality review (PQR) • Qu...Introduction to quality management system• Product quality review (PQR) • Qu...
Introduction to quality management system • Product quality review (PQR) • Qu...
 
Various steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim mirazVarious steps of risk assessment. md. anwar ibrahim miraz
Various steps of risk assessment. md. anwar ibrahim miraz
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Reliability
ReliabilityReliability
Reliability
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management Fundamentals
 
Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 
Qrm presentation
Qrm presentationQrm presentation
Qrm presentation
 

Dernier

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Dernier (20)

Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 

Risk Management (1) (1).ppt

  • 1.
  • 2. • RISK DEFINITION: A Risk is a potential or future event that, should it occur, will have a (negative) impact on the Business Objectives of an Organisation o A risk must have Uncertainty, (in terms of Probability or Likelihood). It might happen o A risk must have a measurable Impact, (usually measured in monetary terms, but other criteria are acceptable, reputation for example) o “It May Rain Tomorrow” • ISSUE DEFINITION: An Issue is a current event that will have a (negative) impact on the Business Objectives of an Organisation o E.g. An Incident, a manifested risk, an Audit Non-Compliance finding, an Equipment or Supplier failure o “It is Raining Today” RISK DEFINITIONS
  • 3. 3 Risk Life Cycle Threat Agent Vulnerability Risk Asset Exposures Safeguard Exploits Leads to Can damage And cause an Can be countermeasured by a
  • 4. 4 Risk Management Cycle Identify Risks Assess Risks Define Desired Results Select Strategy Implement Strategy Monitor Evaluate and Adjust The Process is iteration •The Processes are organized • Each Step output considered as an input for the next step Risk Control Risk Assessment
  • 5. 5
  • 6. 6 Risk Identification What is the purpose of this phase ? • The aims of this phase is to identify , classify and prioritizing the organization’s information assets ( Know ourselves) and identify all important types and sources of risk and uncertainty (know our enemy), associated with each of the investment objectives. • This is a crucial phase. If a risk is not identified it cannot be evaluated and managed
  • 7. 7 Information Assets IS Components People Procedures Data Transmission HW SW Employees Non- employees People at trusted organizations Authorized Staff Other staff Strangers Standard Procedures Sensitive Procedures Process Storage Application OS Security Component System Devises Net Work
  • 8. 8 Primary sources of Risk Items Human Threats Environmental Threats Outside & Natural Threats network based attacks virus infection, unauthorized access floods Earthquakes hurricanes Power failure, pollution
  • 9. Risk Analysis • requires an entity to, conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected information held by the entity. • Risk analysis, which is a tool for risk management, is a method of identifying vulnerabilities and threats, and assessing the possible damage to determine where to implement security safeguards
  • 10. 10 Risk Assessment • For each identified component & risk, which has a 'clearly significant' or 'possibly significant' position, each should be assess to establish qualitatively and Estimate the value
  • 11. 27/05/1444 11 What is Risk Assessment ? • Assessing risk is the process of determining the likelihood of the threat being exercised against the vulnerability and the resulting impact from a successful compromise , i.e determine the relative risk for each of the vulnerabilities • Risk assessment assigns a risk rating or score to each specific information asset, useful in evaluating the relative risk and making comparative ratings later in the risk control process. • Although all elements of the risk management cycle are important, risk assessments provide the foundation for other elements of the cycle. In particular, risk assessments provide a basis for establishing appropriate policies and selecting cost-effective techniques to implement these policies
  • 12. 12 Methods of Risk Assessment There are various methods assessing risk, First : Quantitative risk assessment : generally estimates values of Information Systems components as ; information, systems, business processes, recovery costs, etc., risk can be measured in terms of direct and indirect costs , based on (1) the likelihood that a damaging event will occur (2) the costs of potential losses (3) the costs of mitigating actions that could be taken.
  • 13. 13 This approach can be taken by defining – Risk in more subjective and general terms such as high, medium, and low. – In this regard, qualitative assessments depend more on the expertise, experience, and judgment of those conducting the assessment. • Qualitative risk assessments typically give risk results of “High”, “Moderate” and “Low”. However, by providing the impact and likelihood definition tables and the description of the impact, it is possible to adequately communicate the assessment to the organization’s management. Second : Qualitative Risk Assessment
  • 14. 14 Third :Quantitative and Qualitative – It is also possible to use a combination of quantitative and qualitative method
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. • The identification of Risks and their management by defining:  The Risk Description  The Risk Owner  The Probability of the Risk Event occurring  The Risk Impact in terms of cost, loss of assets, Reputation … Failure to meet a Business Objective  The most suitable Mitigations that will prevent or reduce the Likelihood of the Risk Event occurring with relation to their costs and the reduction of Risk Exposure  The Contingency Plan to recover the Asset once risk is manifested  An understanding of Corporate Risk Appetite and where appropriate the application of Risk Tolerance WHAT IS RISK MANAGEMENT?
  • 39. To ensure that all risks to the Business however they are derived are managed effectively. • This includes: • Strategic Risks • Programme and Project Risks • Operational Risks (includes Security and Business Continuity Risks) OBJECTIVES OF GENERIC RISK MANAGEMENT Operational Level (Business as Usual) Change Level Operational Risk Register Information Security Risk Register BAU Business continuity Strategic Level Strategic Risks Programme/Project Risks Operational Risks Project Risk Register Strategic Risk Register
  • 40. To ensure that the risks to the Organisation that are derived from, Incidents, Threats, Vulnerabilities and Audit non-compliances are managed effectively. In Security Terms these are those risks that impact the: • Confidentiality, • Integrity, • Availability, and the • Traceability of Information whilst: • At rest • Whilst being modified • In transit (around a system, e-mail, media device, telephone etc.) OBJECTIVES OF INFORMATION SECURITY RISK MANAGEMENT
  • 41. Incident Management Audit Non-Compliances Problem Management Threat Management Vulnerability Management Exception / Waiver Management ! However, they can be the Source of Infosec So, these are issues, NO uncertainty! WHAT IS NOT RISK MANAGEMENT?
  • 42.
  • 43.
  • 44. RISK MATRIX IMPACT High Medium High High Medium Low Medium High Low Low Low Medium Low Medium High LIKELIHOOD
  • 45.
  • 46. COMMON PROBLEMS (MISUNDERSTANDINGS)? • Poor Risk Descriptions (Risk vs Issue and Impact confusion) (Qualification vs Quantification) • Unachievable, ineffective and disproportionate Mitigation Actions • Poor Control, risk owner vs risk mitigation owner. Stakeholder Involvement • Reactive vs Proactive Approach • Reliance on Incidents, Threat and Non-Compliance Management (Reactive) • Proactive Risk Identification Workshop based on Success Criteria SO WHAT! • Risks occur that could have been managed • Impact on Assets not understood (BIA, CMDB) • Mitigation Action Costs do not reflect the Risk Exposure Reduction • Systems fail, business and revenue lost, • Corporate data is unavailable when required – Loss of Business • Regulator penalties, reputational damage occurs • Loss of Customer base and confidence • Loss of IPR. PROBLEMS WITH RISK MANAGEMENT
  • 47. o Mitigations or Controls are primarily used to prevent the occurrence of a risk or to reduce the Probability of Risk occurrence - (Reduce Probability). o This is why it is so important to describe the risk event clearly. o Contingency Plans address the Impact of the Risk plans and are used to recover a system from the effect of a risk should it occur, a mini BCP - (Reduce Impact) o This is why it is so important to clearly describe the risk impact separately from the risk description MITIGATION PLANS & CONTINGENCY PLANS
  • 48. o Proliferation of BYOD and smart devices o Cloud computing o Outsourcing of critical business processes to a third party (and lack of controls around third-party services) o Disaster recovery and business continuity o Periodic access reviews o Log reviews SOURCE: Cyber-security - What the Board of Directors need to ask?, IIARF Research Report, 2014 SOURCES OF CYBER SECURITY RISKS
  • 49. o Application vulnerabilities o Remote access. o Ineffective patch management o Weak network security/flat networks o Lack of real-time security monitoring o Third parties o Lack of a data retention policy SOURCE: HANS HENRIK BERTHING Cyber Assurance and the IT Auditor Nov 2014 COMMON CYBER-CRIMINAL ATTACK VECTORS
  • 50. Select appropriate Controls / use Security Standards: ISO27000 PCI DSS COBIT HIPAA WHERE TO START?
  • 51. 1. Create risk reporting awareness for the workforce 2. Make it easy, create a simple Risk Submission form 3. Assess the risk submission, ask questions 4. Ensure it is a RISK, not an issue, a service request, a change request  ENCOURAGE RISK REPORTING
  • 52. 1. Record in a Risk Register 2. Describe the RISK 3. Assess the Likelihood, Impact, and risk rating 4. Agree recommended Risk Mitigation / Treatment 5. Establish a contingency position if possible 6. Assign to an appropriate RISK OWNER (usually a Business Stakeholder) 7. Agree a Mitigation Owner 8. Obtain a decision (Reduce, Accept, Avoid, Transfer) 9. Monitor mitigation progress until target risk is achieved – retain awareness of closed or mitigated risks 10. Produce monthly status reports MANAGE THE RISKS…